/privacy (18)

‘Invisible Network’ is a portable device that makes communication between machines perceptible and tangible. This device acts as a mediator between the user and the machines that surround him. Through its screen, it indicates the relations that it maintains with its personal environment.

Face Trade is an Art Vending Machine created by Matthias Dörfelt that dispenses unique prints of computer generated face drawings. Instead of paying with money, buyers trade a mugshot that is taken on the spot in order to be permanently stored in the Ethereum Blockchain, consequently turning the transaction into a semi-permanent Face Swap.

Created by Lauren McCarthy, “LAUREN” is an online experiment where she attempts to become a human version of Amazon Alexa, a smart home intelligence for people in their own homes. The project will take place as an online three day performance that begins with an installation of a series of custom designed networked smart devices in peoples’ homes.

Created by London-based musical duo the Network Ensemble, Selected Network Studies is a series of audiovisual pieces created using network data collected from a number of locations across London, Berlin and Rome. It is released as limited edition UV-printed, vacuum-sealed mylar package containing a 2GB SD Card with one hour of video material and 45 minutes of sound material.

Created by Jasper van Loenen, Linger is a small, portable device that allows you to create and blend into a virtual crowd by storing the specific WiFi signals from everyone that comes near you, and rebroadcasting their signals infinitely when they leave, making it seem as if they are still there.

Created by Saurabh Datta, border_ctrl explores future government agency, created to keep tabs of internet browsing of individuals. To keep a healthy control of one’s online activities, Internet Border Control[IBC] runs a daemon on individual’s computers.

Created by Moniker (Roel Wouters & Luna Maurer) and made in conjuction with We Are Data travelling installation, Clickclickclick.click reveals the browser events used to monitor our online behaviour.

Continuing a series of works that question privacy in the age of mass surveillance, Aram Bartholl provides a few tips in the video below on practical and impractical things you can do to your phone.

Created by Jochen Maria Weber, Foxes Like Beacons is an exploratory project using open data of public radio stations with inexpensive, low-power signal detection in order to create an open positioning system.

Created by Martin Hertig at ECAL, Sensible Data is a playful installation consisting of three machines that collect user’s personal data, evaluates mood, age, gender and beauty, to create a ‘passport’ that user can take away but which also randomly sent (without user’s knowledge) to another participant.

This past December a dozen artists, activists, and researchers converged at the STUDIO for Creative Inquiry for a book sprint. Led by Addie Wagenknecht, the all-women cadre convened under the collective moniker Deep Lab, and examined how privacy, security, surveillance, and large-scale data aggregation are problematized in the arts, culture and society.

Sorry, this is Members Only content. Please Log-in. Join us today by becoming a Member. Archive: More than 3,500 project profiles, scores of essays, interviews and reviews.Publish: Post your projects, events, announcements.No Ads: No advertisements, miners, banners.Education: Tutorials (beginners and advanced) with code examples, downloads.Jobs Archive: Find employers who have recruited here in the past…

Sorry, this is Members Only content. Please Log-in. Join us today by becoming a Member. Archive: More than 3,500 project profiles, scores of essays, interviews and reviews.Publish: Post your projects, events, announcements.No Ads: No advertisements, miners, banners.Education: Tutorials (beginners and advanced) with code examples, downloads.Jobs Archive: Find employers who have recruited here in the past…

User 632 is an installation that stores the behaviour of the people who look at it by monitoring them in return. It is designed to know when and how a person passes and stores information as data or ID dependant on proximity.

Sorry, this is Members Only content. Please Log-in. Join us today by becoming a Member. Archive: More than 3,500 project profiles, scores of essays, interviews and reviews.Publish: Post your projects, events, announcements.No Ads: No advertisements, miners, banners.Education: Tutorials (beginners and advanced) with code examples, downloads.Jobs Archive: Find employers who have recruited here in the past…

Sorry, this is Members Only content. Please Log-in. Join us today by becoming a Member. Archive: More than 3,500 project profiles, scores of essays, interviews and reviews.Publish: Post your projects, events, announcements.No Ads: No advertisements, miners, banners.Education: Tutorials (beginners and advanced) with code examples, downloads.Jobs Archive: Find employers who have recruited here in the past…